Search results for: impact threat
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 12012

Search results for: impact threat

12012 Creativity and Stereotype Threat: Analysis of the Impact of Creativity on Eliminating the Stereotype Threat in the Educational Setting

Authors: Aleksandra Gajda

Abstract:

Among students between 12 and 13, the probability of activating the stereotype threat increases noticeably. Girls consider themselves weaker in science, while boys consider themselves weaker in the field of language skills. This phenomenon is disturbing because it may result in wrong choices of the further path of education, not consistent with the actual competences of the students. Meanwhile, negative effects of the stereotype threat, observable in the loss of focus on the task and transferring it to dealing with fear of failure, can be reduced by various factors. The study examined the impact of creativity on eliminating the stereotype threat. The experiment in the form of a 2 (gender: male vs. female) x 3 (traditional gender roles: neutral version vs. nontraditional gender roles) x 2 (creativity: low vs. high) factorial design was conducted. The results showed that a high level of creative abilities may reduce the negative effects of stereotype threat in educational setting.

Keywords: creativity, education, language skills, mathematical skills, stereotype threat

Procedia PDF Downloads 119
12011 Probabilistic Study of Impact Threat to Civil Aircraft and Realistic Impact Energy

Authors: Ye Zhang, Chuanjun Liu

Abstract:

In-service aircraft is exposed to different types of threaten, e.g. bird strike, ground vehicle impact, and run-way debris, or even lightning strike, etc. To satisfy the aircraft damage tolerance design requirements, the designer has to understand the threatening level for different types of the aircraft structures, either metallic or composite. Exposing to low-velocity impacts may produce very serious internal damages such as delaminations and matrix cracks without leaving visible mark onto the impacted surfaces for composite structures. This internal damage can cause significant reduction in the load carrying capacity of structures. The semi-probabilistic method provides a practical and proper approximation to establish the impact-threat based energy cut-off level for the damage tolerance evaluation of the aircraft components. Thus, the probabilistic distribution of impact threat and the realistic impact energy level cut-offs are the essential establishments required for the certification of aircraft composite structures. A new survey of impact threat to civil aircraft in-service has recently been carried out based on field records concerning around 500 civil aircrafts (mainly single aisles) and more than 4.8 million flight hours. In total 1,006 damages caused by low-velocity impact events had been screened out from more than 8,000 records including impact dents, scratches, corrosions, delaminations, cracks etc. The impact threat dependency on the location of the aircraft structures and structural configuration was analyzed. Although the survey was mainly focusing on the metallic structures, the resulting low-energy impact data are believed likely representative to general civil aircraft, since the service environments and the maintenance operations are independent of the materials of the structures. The probability of impact damage occurrence (Po) and impact energy exceedance (Pe) are the two key parameters for describing the statistic distribution of impact threat. With the impact damage events from the survey, Po can be estimated as 2.1x10-4 per flight hour. Concerning the calculation of Pe, a numerical model was developed using the commercial FEA software ABAQUS to backward estimate the impact energy based on the visible damage characteristics. The relationship between the visible dent depth and impact energy was established and validated by drop-weight impact experiments. Based on survey results, Pe was calculated and assumed having a log-linear relationship versus the impact energy. As the product of two aforementioned probabilities, Po and Pe, it is reasonable and conservative to assume Pa=PoxPe=10-5, which indicates that the low-velocity impact events are similarly likely as the Limit Load events. Combing Pa with two probabilities Po and Pe obtained based on the field survey, the cutoff level of realistic impact energy was estimated and valued as 34 J. In summary, a new survey was recently done on field records of civil aircraft to investigate the probabilistic distribution of impact threat. Based on the data, two probabilities, Po and Pe, were obtained. Considering a conservative assumption of Pa, the cutoff energy level for the realistic impact energy has been determined, which provides potential applicability in damage tolerance certification of future civil aircraft.

Keywords: composite structure, damage tolerance, impact threat, probabilistic

Procedia PDF Downloads 308
12010 Using Social Network Analysis for Cyber Threat Intelligence

Authors: Vasileios Anastopoulos

Abstract:

Cyber threat intelligence assists organizations in understanding the threats they face and helps them make educated decisions on preparing their defenses. Sharing of threat intelligence and threat information is increasingly leveraged by organizations and enterprises, and various software solutions are already available, with the open-source malware information sharing platform (MISP) being a popular one. In this work, a methodology for the production of cyber threat intelligence using the threat information stored in MISP is proposed. The methodology leverages the discipline of social network analysis and the diamond model, a model used for intrusion analysis, to produce cyber threat intelligence. The workings are demonstrated with a case study on a production MISP instance of a real organization. The paper concluded with a discussion on the proposed methodology and possible directions for further research.

Keywords: cyber threat intelligence, diamond model, malware information sharing platform, social network analysis

Procedia PDF Downloads 178
12009 Analysis on Cyber Threat Actors Targeting Automated Border Security Systems

Authors: Mirko Sailio

Abstract:

Border crossing automatization reduces required human resources in handling people crossing borders. As technology replaces and augments the work done by border officers, new cyber threats arise to threaten border security. This research analyses the current cyber threat actors and their capabilities. The analysis is conducted by gathering the threat actor data from a wide range of public sources. A model for a general border automatization system is presented, and its most significant cyber-security attributes are then compared to threat actor activity and capabilities in order to predict priorities in securing such systems. Organized crime and nation-state actors present the clearest threat to border cyber-security, and additional focus is given to their motivations and activities.

Keywords: border automation, cyber-security, threat actors, border cyber-security

Procedia PDF Downloads 205
12008 Supervised Learning for Cyber Threat Intelligence

Authors: Jihen Bennaceur, Wissem Zouaghi, Ali Mabrouk

Abstract:

The major aim of cyber threat intelligence (CTI) is to provide sophisticated knowledge about cybersecurity threats to ensure internal and external safeguards against modern cyberattacks. Inaccurate, incomplete, outdated, and invaluable threat intelligence is the main problem. Therefore, data analysis based on AI algorithms is one of the emergent solutions to overcome the threat of information-sharing issues. In this paper, we propose a supervised machine learning-based algorithm to improve threat information sharing by providing a sophisticated classification of cyber threats and data. Extensive simulations investigate the accuracy, precision, recall, f1-score, and support overall to validate the designed algorithm and to compare it with several supervised machine learning algorithms.

Keywords: threat information sharing, supervised learning, data classification, performance evaluation

Procedia PDF Downloads 150
12007 Intervention of Threat and Surveillance on the Obedience of Preschool Children

Authors: Sarah Mhae Diaz, Erika Anna De Leon, Jacklin Alwil Cartagena, Geordan Caruncong, Micah Riezl Gonzales

Abstract:

This study examined the intervention of threat and surveillance on the obedience of 100 preschool children through a task variable experiment replicated from the previous studies of Higbee (1979), and Chua, J., Chua, M., & Pico (1983). Nowadays, obedience among Filipino children to authority is disregarded since they are more outspoken and rebel due to social influences. With this, aside from corporal punishment, threat and surveillance became a mean of inducing obedience. Threat, according to the Dissonance Theory, can give attitudinal change. On the other hand, surveillance, according to the Theory of Social Facilitation, can either contribute to the completion or failure to do a task. Through a 2x2 factorial design, results show; (1) threat (F(1,96) = 12.487, p < 0.05) and (2) surveillance (F(1,96)=9.942, p<.05) had a significant main effect on obedience, suggesting that the Dissonance Theory and Theory of Social Facilitation is respectively true in the study. On the other hand, (3) no interaction (F(1,96)=1.303, p > .05) was seen since threat and surveillance both have a main effect that could be positive or negative, or could be because of their complementary property as supported by the post-hoc results. Also, (4) most effective commanding style is threat and surveillance setting (M = 30.04, SD = 7.971) due to the significant main effect of the two variables. With this, in the Filipino Setting, threat and surveillance has proven to be a very effective strategy to discipline and induce obedience from a child.

Keywords: experimental study, obedience, preschool children, surveillance, threat

Procedia PDF Downloads 490
12006 Environmental Impacts on Urban Agriculture in Algiers

Authors: Sara Bouzekri, Said Madani

Abstract:

In many Mediterranean cities such as Algiers, the human activity, the strong mobility the urban sprawl, the air pollution, the problems of waste management, the wasting of the resources and the degradation of the environment weaken in an unquestionable way the farming. The question of sustainable action vis-a-vis these threats arises then in order to maintain a level of desired local development. The methodology is based on a multi-criteria method based on the AFOM diagnosis, which classifies agricultural strength indicators and those of threat, according to an analytical approach. In a sustainable development perspective, it will be appropriate to link the threat factors of the case study with the factors of climate change to see their impact on the future of agriculture. This will be accompanied by a SWOT analysis, which crosses the most significant criteria to arrive at the necessary recommendations based on future projects for urban agriculture.

Keywords: Algiers, environment, urban agriculture, threat factors

Procedia PDF Downloads 300
12005 Support of Syrian Refugees: The Roles of Descriptive and Injunctive Norms, Perception of Threat, and Negative Emotions

Authors: Senay Yitmen

Abstract:

This research investigated individual’s support and helping intentions towards Syrian refugees in Turkey. This is examined in relation to perceived threat and negative emotions, and also to the perceptions of whether one’s intimate social network (family and friends) considers Syrians a threat (descriptive network norm) and whether this network morally supports Syrian refugees (injunctive norms). A questionnaire study was conducted among Turkish participants (n= 565) and the results showed that perception of threat was associated with negative emotions which, in turn, were related to less support of Syrian refugees. Additionally, descriptive norms moderated the relationship between perceived threat and negative emotions towards Syrian refugees. Furthermore, injunctive norms moderated the relationship between negative emotions and support to Syrian refugees. Specifically, the findings indicate that perceived threat is associated with less support of Syrian refugees through negative emotions when descriptive norms are weak and injunctive norms are strong. Injunctive norms appear to trigger a dilemma over the decision to conform or not to conform: when one has negative emotions as a result of perceived threat, it becomes more difficult to conform to the moral obligation of injunctive norms which is associated with less support of Syrian refugees. Hence, these findings demonstrate that both descriptive and injunctive norms are important and play different roles in individual’s support of Syrian refugees.

Keywords: descriptive norms, emotions, injunctive norms, the perception of threat

Procedia PDF Downloads 191
12004 Cybercrime Stage Based Intervention: Through the Eyes of a Cyber Threat Actor

Authors: Jonathan W. Z. Lim, Vrizlynn L. L. Thing

Abstract:

Cybercrimes are on the rise, in part due to technological advancements, as well as increased avenues of exploitation. Sophisticated threat actors are leveraging on such advancements to execute their malicious intentions. The increase in cybercrimes is prevalent, and it seems unlikely that they can be easily eradicated. A more serious concern is that the community may come to accept the notion that this will become the trend. As such, the key question revolves around how we can reduce cybercrime in this evolving landscape. In our paper, we propose to build a systematic framework through the lens of a cyber threat actor. We explore the motivation factors behind the crimes and the crime stages of the threat actors. We then formulate intervention plans so as to discourage the act of committing malicious cyber activities and also aim to integrate ex-cyber offenders back into society.

Keywords: crime motivations, crime prevention, cybercrime, ex-cyber criminals

Procedia PDF Downloads 140
12003 Application of Directed Acyclic Graphs for Threat Identification Based on Ontologies

Authors: Arun Prabhakar

Abstract:

Threat modeling is an important activity carried out in the initial stages of the development lifecycle that helps in building proactive security measures in the product. Though there are many techniques and tools available today, one of the common challenges with the traditional methods is the lack of a systematic approach in identifying security threats. The proposed solution describes an organized model by defining ontologies that help in building patterns to enumerate threats. The concepts of graph theory are applied to build the pattern for discovering threats for any given scenario. This graph-based solution also brings in other benefits, making it a customizable and scalable model.

Keywords: directed acyclic graph, ontology, patterns, threat identification, threat modeling

Procedia PDF Downloads 140
12002 Threat Modeling Methodology for Supporting Industrial Control Systems Device Manufacturers and System Integrators

Authors: Raluca Ana Maria Viziteu, Anna Prudnikova

Abstract:

Industrial control systems (ICS) have received much attention in recent years due to the convergence of information technology (IT) and operational technology (OT) that has increased the interdependence of safety and security issues to be considered. These issues require ICS-tailored solutions. That led to the need to creation of a methodology for supporting ICS device manufacturers and system integrators in carrying out threat modeling of embedded ICS devices in a way that guarantees the quality of the identified threats and minimizes subjectivity in the threat identification process. To research, the possibility of creating such a methodology, a set of existing standards, regulations, papers, and publications related to threat modeling in the ICS sector and other sectors was reviewed to identify various existing methodologies and methods used in threat modeling. Furthermore, the most popular ones were tested in an exploratory phase on a specific PLC device. The outcome of this exploratory phase has been used as a basis for defining specific characteristics of ICS embedded devices and their deployment scenarios, identifying the factors that introduce subjectivity in the threat modeling process of such devices, and defining metrics for evaluating the minimum quality requirements of identified threats associated to the deployment of the devices in existing infrastructures. Furthermore, the threat modeling methodology was created based on the previous steps' results. The usability of the methodology was evaluated through a set of standardized threat modeling requirements and a standardized comparison method for threat modeling methodologies. The outcomes of these verification methods confirm that the methodology is effective. The full paper includes the outcome of research on different threat modeling methodologies that can be used in OT, their comparison, and the results of implementing each of them in practice on a PLC device. This research is further used to build a threat modeling methodology tailored to OT environments; a detailed description is included. Moreover, the paper includes results of the evaluation of created methodology based on a set of parameters specifically created to rate threat modeling methodologies.

Keywords: device manufacturers, embedded devices, industrial control systems, threat modeling

Procedia PDF Downloads 81
12001 Group Boundaries against and Due to Identity Threat

Authors: Anna Siegler, Sara Bigazzi, Sara Serdult, Ildiko Bokretas

Abstract:

Social identity emerging from group membership defines the representational processes of our social reality. Based on our theoretical assumption the subjective perception of identity threat leads to an instable identity structure. The need to re-establish the positive identity will lead us to strengthen group boundaries. Prejudice in our perspective offer psychological security those who thinking in exclusive barriers, and we suggest that those who identify highly with their ingroup/national identity and less with superordinate identities take distance from others and this is related to their perception of threat. In our study we used a newly developed questionnaire, the Multiple Threat and Prejudice Questionnaire (MTPQ) which measure identity threat at different dimensions of identification (national, existential, gender, religious) and the distancing of different outgroups, over and above we worked with Social Dominance Orientation (SDO) and Identification with All Humanity Scale (IWAH). We conduct one data collection (N=1482) in a Hungarian sample to examine the connection between national threat and distance-taking, and this survey includes the investigation (N=218) of identification with different group categories. Our findings confirmed that those who feel themselves threatened in their national identity aspects are less likely to identify themselves with superordinate groups and this correlation is much stronger when they think about the nation as a bio-cultural unit, while if nation defined as a social-economy entity this connection is less powerful and has just the opposite direction.

Keywords: group boundaries, identity threat, prejudice, superordinate groups

Procedia PDF Downloads 411
12000 Analysis of Lightweight Register Hardware Threat

Authors: Yang Luo, Beibei Wang

Abstract:

In this paper, we present a design methodology of lightweight register transfer level (RTL) hardware threat implemented based on a MAX II FPGA platform. The dynamic power consumed by the toggling of the various bit of registers as well as the dynamic power consumed per unit of logic circuits were analyzed. The hardware threat was designed taking advantage of the differences in dynamic power consumed per unit of logic circuits to hide the transfer information. The experiment result shows that the register hardware threat was successfully implemented by using different dynamic power consumed per unit of logic circuits to hide the key information of DES encryption module. It needs more than 100000 sample curves to reduce the background noise by comparing the sample space when it completely meets the time alignment requirement. In additional, an external trigger signal is playing a very important role to detect the hardware threat in this experiment.

Keywords: side-channel analysis, hardware Trojan, register transfer level, dynamic power

Procedia PDF Downloads 279
11999 R-Killer: An Email-Based Ransomware Protection Tool

Authors: B. Lokuketagoda, M. Weerakoon, U. Madushan, A. N. Senaratne, K. Y. Abeywardena

Abstract:

Ransomware has become a common threat in past few years and the recent threat reports show an increase of growth in Ransomware infections. Researchers have identified different variants of Ransomware families since 2015. Lack of knowledge of the user about the threat is a major concern. Ransomware detection methodologies are still growing through the industry. Email is the easiest method to send Ransomware to its victims. Uninformed users tend to click on links and attachments without much consideration assuming the emails are genuine. As a solution to this in this paper R-Killer Ransomware detection tool is introduced. Tool can be integrated with existing email services. The core detection Engine (CDE) discussed in the paper focuses on separating suspicious samples from emails and handling them until a decision is made regarding the suspicious mail. It has the capability of preventing execution of identified ransomware processes. On the other hand, Sandboxing and URL analyzing system has the capability of communication with public threat intelligence services to gather known threat intelligence. The R-Killer has its own mechanism developed in its Proactive Monitoring System (PMS) which can monitor the processes created by downloaded email attachments and identify potential Ransomware activities. R-killer is capable of gathering threat intelligence without exposing the user’s data to public threat intelligence services, hence protecting the confidentiality of user data.

Keywords: ransomware, deep learning, recurrent neural networks, email, core detection engine

Procedia PDF Downloads 216
11998 The Correlation Between the Rise of China and the US-Iranian Conflict: An American Perspective

Authors: Ranj Tofik

Abstract:

This article aims to demonstrate a link and/or correlation between the rise of China and the US-Iranian conflict, from a US point of view. To demonstrate this link, the article relies on the content analysis method by analyzing American reports and official data. This article concludes that this correlation indicates that the more China rises and the greater the Chinese threat to America, the more changes will occur in the US-Iranian conflict and the US actions regarding this conflict will increase – in the form of imposing sanctions and using means of pressure on Iran, or trying to reach an agreement and settlement with Iran. This article, via noting and observing that correlation, also claims that before 2012, Iran was a regional threat to US interests in the Middle East. However, after 2012 when the rise of China became one of the major threats to America, Iran, because of its rapprochement with China, became also part of the Chinese threat, which is a threat to America's global standing. In addition, observing this correlation indicates the possibility that the rise of China and its threat to the USA has become one of the main drivers in the US-Iranian conflict. Consequently, it can be said that Iran has become a vital issue in the US-China rivalry, as it has become an appropriate gateway for China to enter the Middle East and undermine US hegemony there.

Keywords: China-Iran relations, China's rise, JCPOA, US-Chinese competition, US-Iranian conflict

Procedia PDF Downloads 102
11997 The Effects of Self-Efficacy on Challenge and Threat States

Authors: Nadine Sammy, Mark Wilson, Samuel Vine

Abstract:

The Theory of Challenge and Threat States in Athletes (TCTSA) states that self-efficacy is an antecedent of challenge and threat. These states result from conscious and unconscious evaluations of situational demands and personal resources and are represented by both cognitive and physiological markers. Challenge is considered a more adaptive stress response as it is associated with a more efficient cardiovascular profile, as well as better performance and attention effects compared with threat. Self-efficacy is proposed to influence challenge/threat because an individual’s belief that they have the skills necessary to execute the courses of action required to succeed contributes to a perception that they can cope with the demands of the situation. This study experimentally examined the effects of self-efficacy on cardiovascular responses (challenge and threat), demand and resource evaluations, performance and attention under pressurised conditions. Forty-five university students were randomly assigned to either a control (n=15), low self-efficacy (n=15) or high self-efficacy (n=15) group and completed baseline and pressurised golf putting tasks. Self-efficacy was manipulated using false feedback adapted from previous studies. Measures of self-efficacy, cardiovascular reactivity, demand and resource evaluations, task performance and attention were recorded. The high self-efficacy group displayed more favourable cardiovascular reactivity, indicative of a challenge state, compared with the low self-efficacy group. The former group also reported high resource evaluations, but no task performance or attention effects were detected. These findings demonstrate that levels of self-efficacy influence cardiovascular reactivity and perceptions of resources under pressurised conditions.

Keywords: cardiovascular, challenge, performance, threat

Procedia PDF Downloads 233
11996 A Reasoning Method of Cyber-Attack Attribution Based on Threat Intelligence

Authors: Li Qiang, Yang Ze-Ming, Liu Bao-Xu, Jiang Zheng-Wei

Abstract:

With the increasing complexity of cyberspace security, the cyber-attack attribution has become an important challenge of the security protection systems. The difficult points of cyber-attack attribution were forced on the problems of huge data handling and key data missing. According to this situation, this paper presented a reasoning method of cyber-attack attribution based on threat intelligence. The method utilizes the intrusion kill chain model and Bayesian network to build attack chain and evidence chain of cyber-attack on threat intelligence platform through data calculation, analysis and reasoning. Then, we used a number of cyber-attack events which we have observed and analyzed to test the reasoning method and demo system, the result of testing indicates that the reasoning method can provide certain help in cyber-attack attribution.

Keywords: reasoning, Bayesian networks, cyber-attack attribution, Kill Chain, threat intelligence

Procedia PDF Downloads 452
11995 Strategic Cyber Sentinel: A Paradigm Shift in Enhancing Cybersecurity Resilience

Authors: Ayomide Oyedele

Abstract:

In the dynamic landscape of cybersecurity, "Strategic Cyber Sentinel" emerges as a revolutionary framework, transcending traditional approaches. This paper pioneers a holistic strategy, weaving together threat intelligence, machine learning, and adaptive defenses. Through meticulous real-world simulations, we demonstrate the unprecedented resilience of our framework against evolving cyber threats. "Strategic Cyber Sentinel" redefines proactive threat mitigation, offering a robust defense architecture poised for the challenges of tomorrow.

Keywords: cybersecurity, resilience, threat intelligence, machine learning, adaptive defenses

Procedia PDF Downloads 84
11994 A Machine Learning-Assisted Crime and Threat Intelligence Hunter

Authors: Mohammad Shameel, Peter K. K. Loh, James H. Ng

Abstract:

Cybercrime is a new category of crime which poses a different challenge for crime investigators and incident responders. Attackers can mask their identities using a suite of tools and with the help of the deep web, which makes them difficult to track down. Scouring the deep web manually takes time and is inefficient. There is a growing need for a tool to scour the deep web to obtain useful evidence or intel automatically. In this paper, we will explain the background and motivation behind the research, present a survey of existing research on related tools, describe the design of our own crime/threat intelligence hunting tool prototype, demonstrate its capability with some test cases and lastly, conclude with proposals for future enhancements.

Keywords: cybercrime, deep web, threat intelligence, web crawler

Procedia PDF Downloads 175
11993 Sharing Experience in Authentic Learning for Mobile Security

Authors: Kai Qian, Lixin Tao

Abstract:

Mobile devices such as smartphones are getting more and more popular in our daily lives. The security vulnerability and threat attacks become a very emerging and important research and education topic in computing security discipline. There is a need to have an innovative mobile security hands-on laboratory to provide students with real world relevant mobile threat analysis and protection experience. This paper presents an authentic teaching and learning mobile security approach with smartphone devices which covers most important mobile threats in most aspects of mobile security. Each lab focuses on one type of mobile threats, such as mobile messaging threat, and conveys the threat analysis and protection in multiple ways, including lectures and tutorials, multimedia or app-based demonstration for threats analysis, and mobile app development for threat protections. This authentic learning approach is affordable and easily-adoptable which immerse students in a real world relevant learning environment with real devices. This approach can also be applied to many other mobile related courses such as mobile Java programming, database, network, and any security relevant courses so that can learn concepts and principles better with the hands-on authentic learning experience.

Keywords: mobile computing, Android, network, security, labware

Procedia PDF Downloads 407
11992 Hierarchical Filtering Method of Threat Alerts Based on Correlation Analysis

Authors: Xudong He, Jian Wang, Jiqiang Liu, Lei Han, Yang Yu, Shaohua Lv

Abstract:

Nowadays, the threats of the internet are enormous and increasing; however, the classification of huge alert messages generated in this environment is relatively monotonous. It affects the accuracy of the network situation assessment, and also brings inconvenience to the security managers to deal with the emergency. In order to deal with potential network threats effectively and provide more effective data to improve the network situation awareness. It is essential to build a hierarchical filtering method to prevent the threats. In this paper, it establishes a model for data monitoring, which can filter systematically from the original data to get the grade of threats and be stored for using again. Firstly, it filters the vulnerable resources, open ports of host devices and services. Then use the entropy theory to calculate the performance changes of the host devices at the time of the threat occurring and filter again. At last, sort the changes of the performance value at the time of threat occurring. Use the alerts and performance data collected in the real network environment to evaluate and analyze. The comparative experimental analysis shows that the threat filtering method can effectively filter the threat alerts effectively.

Keywords: correlation analysis, hierarchical filtering, multisource data, network security

Procedia PDF Downloads 202
11991 A Preliminary Study Examining the Effect of Tourism as Perceived by Locals: From Perspective of Conservative of Research Theory

Authors: Ali Ahmad AlGassim

Abstract:

The objective of this study is to explore the local community perceptions toward the impact of tourism from the COR theory perspective. The current study used qualitative methods and purposive sampling to engage informants. Data was collected using an online survey with closed-ended and open-ended questions from 57 informants living in Al-Jufa Village, and then data was analysed using content analysis. The findings showed that COR theory help explains the residents’ perception of the threat and stress of losing resources. The findings showed the residents feel stressed about losing resources, such as lands, houses, heritage, sociocultural and Islamic values, as well as job and investment opportunities if the village is developed for tourism. Findings also present that one group of residents declared rejections and aiming to resist the development if it takes place, and they will not allowing foreigners to come and live in the village. The findings also show that this stress and strain can be alleviated by allowing residents to participate in the development. Finally, the residents of Al-Juhfa showed a high level of feeling of ownership towards their resources.

Keywords: perception of threat, effect of tourism, COR theory, local community, impact of tourism, Saudi Arabia

Procedia PDF Downloads 266
11990 Current Environmental Accounting Disclosure Requirements and Compliance by Nigerian Oil Companies

Authors: Amina Jibrin Ahmed

Abstract:

The environment is mankind's natural habitat. Industrial activities over time have taken their toll on it in the form of deterioration and degradation. The petroleum industry is particularly notorious for its negative impact on its host environments. The realization that this poses a threat to sustainability led to the increased awareness and subsequent recognition of the importance of environmental disclosure in financial statements. This paper examines the laws and regulations put in place by the Nigerian Government to mitigate this impact, and the level of compliance by Shell Nigeria, the pioneer and largest oil company in the country. Based on the disclosure made, this paper finds there is indeed a high level of compliance by that company, and voluntary disclosure moreover.

Keywords: environmental accounting, legitimacy theory, environmental impact assessment, environmental disclosure, host communities

Procedia PDF Downloads 519
11989 Development of Terrorist Threat Prediction Model in Indonesia by Using Bayesian Network

Authors: Hilya Mudrika Arini, Nur Aini Masruroh, Budi Hartono

Abstract:

There are more than 20 terrorist threats from 2002 to 2012 in Indonesia. Despite of this fact, preventive solution through studies in the field of national security in Indonesia has not been conducted comprehensively. This study aims to provide a preventive solution by developing prediction model of the terrorist threat in Indonesia by using Bayesian network. There are eight stages to build the model, started from literature review, build and verify Bayesian belief network to what-if scenario. In order to build the model, four experts from different perspectives are utilized. This study finds several significant findings. First, news and the readiness of terrorist group are the most influent factor. Second, according to several scenarios of the news portion, it can be concluded that the higher positive news proportion, the higher probability of terrorist threat will occur. Therefore, the preventive solution to reduce the terrorist threat in Indonesia based on the model is by keeping the positive news portion to a maximum of 38%.

Keywords: Bayesian network, decision analysis, national security system, text mining

Procedia PDF Downloads 392
11988 Personal Identity and Group Identity under Threat following Exclusion: A Study in Singapore and in the Netherlands

Authors: Z. N. Huwaë, E.M. W. Tong, Y. H. M. See

Abstract:

In the present study, the researchers examined whether people from collectivistic cultures perceive a more group identity threat following social exclusion, whereas a more personal identity threat would be the case for those from individualistic cultures. In doing so, they investigated whether threatened identities depend on whether people are excluded by ingroup members (same ethnic background) or outgroup members (another ethnic background), as exclusion studies have shown mixed results when it comes to being excluded by ingroup versus outgroup members. For this purpose, students in Singapore and in the Netherlands participated in an online ball-tossing game (Cyberball) where they were excluded or included by other players with either the same or other ethnicity. Tentative results showed that both Singaporean and Dutch participants reported a more threat to their group identity than to their personal identity following exclusion and this did not depend on who excluded them. These tentative findings suggest that threatened identities following exclusion may not depend on cultural factors or on the source of exclusion.

Keywords: cultures, exclusion, experiment, group membership, identities

Procedia PDF Downloads 119
11987 Cognitive and Environmental Factors Affecting Graduate Student Perception of Mathematics

Authors: Juanita Morris

Abstract:

The purpose of this study will examine the mediating relationships between the theories of intelligence, mathematics anxiety, gender stereotype threat, meta-cognition and math performance through the use of eye tracking technology, affecting student perception and problem-solving abilities. The participants will consist of (N=80) female graduate students. Test administered were the Abbreviated Math Anxiety Scale, Tobii Eye Tracking software, gender stereotype threat through Google images, and they will be asked to describe their problem-solving approach allowed to measure metacognition. Participants will be administered mathematics problems while having gender stereotype threat shown to them through online images while being directed to look at the eye tracking software Tobii. We will explore this by asking ‘Is mathematics anxiety associated with the theories of intelligence and gender stereotype threat and how does metacognition and math performance place a role in mediating those perspectives?’. It is hypothesized that math-anxious students are more likely affected by the gender stereotype threat and that may play a role in their performance? Furthermore, we also want to explore whether math anxious students are more likely to be an entity theorist than incremental theorist and whether those who are math anxious will be more likely to be fixated on variables associated with coefficients? Path analysis and independent samples t-test will be used to generate results for this study. We hope to conclude that both the theories of intelligence and metacognition mediate the relationship between mathematics anxiety and gender stereotype threat.

Keywords: math anxiety, emotions, affective domains fo learning, cognitive underlinings

Procedia PDF Downloads 270
11986 Countering Terrorism through Social Media: Case Study in Indonesia

Authors: Mauly Budiyanti, Aisyah M. Anggiana

Abstract:

Terrorism is a threat to national security since the war on terror era after the tragedy of 9/11. The shifting of national threat from military to non-military centric leads us to recognize that military action is not the only way to face and solve terrorism. Alongside the use of military action to counter terrorism, Indonesia has another way to counter it by using the role of social media. The role of social media on spreading positivity to counter terrorism has the power to show that people now are fearless toward terrorist attack because their goal is to make sure that people are threatened enough by the way they act. This is showing the emergence of the non-state actor has a big impact on national security, as well as pluralism, said about the involving of non-state actor on international events. In this paper, we will examine the role of social media in countering terrorism based on study case in Indonesia.

Keywords: Indonesia, national security, social media, terrorism.

Procedia PDF Downloads 221
11985 Terrorism: A Threat in Constant Evolution Still Misunderstood

Authors: M. J. Gazapo Lapayese

Abstract:

It is a well-established fact that terrorism is one of the foremost threats to present-day international security. The creation of tools or mechanisms for confronting it in an effective and efficient manner will only be possible by way of an objective assessment of the phenomenon. In order to achieve this, this paper has the following three main objectives: Firstly, setting out to find the reasons that have prevented the establishment of a universally accepted definition of terrorism, and consequently trying to outline the main features defining the face of the terrorist threat in order to discover the fundamental goals of what is now a serious blight on world society. Secondly, trying to explain the differences between a terrorist movement and a terrorist organisation, and the reasons for which a terrorist movement can be led to transform itself into an organisation. After analysing these motivations and the characteristics of a terrorist organisation, an example of the latter will be succinctly analysed to help the reader understand the ideas expressed. Lastly, discovering and exposing the factors that can lead to the appearance of terrorist tendencies, and discussing the most efficient and effective responses that can be given to this global security threat.

Keywords: responses, resilience, security, terrorism

Procedia PDF Downloads 453
11984 The Aftermath of Insurgency on Educational Attainment in Nigeria: A Peril on National Development

Authors: David Chapola Nggada

Abstract:

This is a survey designed to find out the impact of the ongoing insurgency in north eastern Nigeria on educational attainment. It is a mixture of both qualitative and quantitative research work on a sample size of 71 secondary school students currently displaced from Baga Biu and Monguno areas of Borno State, now residing as internally displaced persons(IDPs) in Gombe and Yola IDP camps. This was done through both semi structured interview and questionnaire administration. Statistical methods used include percentage and cross tables to gain specific insight into different dimensions of what this implies. Two major aspects of the impact covered were impact on individual student and impact on societal development. These two dimensions were measured against national development variables and analyzed against reviewed literature and findings across the globe. A combination of theories from different fields led to a deeper and better insight. The results confirm a significant relationship between educational attainment and the development of the north east region and Nigeria as a whole. Recommendations were made on ways of reintegrating this group back to the educational system.

Keywords: education, insurgency, national development, threat

Procedia PDF Downloads 247
11983 Religious Insurgency in Nigeria: A Bane to National Unity

Authors: Ayoola Adediran Amos

Abstract:

Nigeria as a secular state that is characterized with various religions namely: Christianity, Islam and African Religion. Each of the religion adherents often claim that their religion is the only means of gaining eternity while others who do not belong to their sect may not be opportuned. Religious doctrine within those religious sects is another source of insurgency which serves as a threat to the unity of Nigeria. Similarly, Boko Haram Religious group has become a threat to the unity of the country in which its root has both political and religious undertones. Primary and secondary sources of collecting data were used. Historical method allowed enquiry into the past events and improvement to the current experience. Both published and unpublished theses were used. Interview was also conducted as part of the secondary sources. It was observed that all aspects of the system in Nigeria were affected with this scourge of religious unrest. i.e. education, political, economic and a host of others. Finally, it was recommended that religious leaders should be given adequate orientation on the needs not to preach against other religious groups. Government of Nigeria should not give priority to one religion at the expense of others.

Keywords: insurgency, national unity, religious, threat

Procedia PDF Downloads 332